Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240600051-6.doi: 10.11896/jsjkx.240600051

• Information Security • Previous Articles     Next Articles

Security Situation Assessment Method for Intelligent Water Resources Network Based on ImprovedD-S Evidence

XIA Zhuoqun1, ZHOU Zihao1, DENG Bin2, KANG Chen3   

  1. 1 School of Computer and Communication Engineering,Changsha University of Technology,Changsha 410000,China
    2 School of Hydraulic and Environmental Engineering,Changsha University of Technology,Changsha 410000,China
    3 Network Information Technology Department of Hunan Provincial Flood and Drought Disaster Prevention Center,Changsha 410000,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:XIA Zhuoqun,born in 1977,Ph.D,professor.His main research interest is network security.
    ZHOU Zihao,born in 1999,postgraduate.His main research interest is network security.
  • Supported by:
    Hunan Provincial Department of Water Resources Science and Technology Project(XSKJ2023059-40).

Abstract: Intelligent water conservancy is an important industry and field of national key information infrastructure.The research on network security situation assessment technology provides powerful support for data protection and network security construction of smart water conservancy.This paper proposes a smart water conservancy situation assessment method based on improved D-S evidence theory,in response to the characteristics of smart water conservancy network models and the problems of insufficient objectivity and large evidence conflicts in network security situation assessment models based on a single D-S evidence theory.Firstly,in the face of massive water conservancy data,deep autoencoders are used to learn features and filter and reduce dimensionality of the data.Then,the processed data is handed over to a deep neural network for binary and multi classification calculations,and the results are fused to obtain the basic probability allocation function value as input for D-S evidence theory.Finally,the fusion rule of D-S evidence theory is used to obtain the final network security situation assessment result.Experimental results show that,compared to traditional situational assessment models,our method can maintain high accuracy while improving objectivity.

Key words: Intelligent water conservancy, Network security situation awareness, D-S theory of evidence, Deep autoencoder, Deep neural networks

CLC Number: 

  • TN915.08
[1]WU K H,LI Y,CHEN F,et al.A method for describing industrial control system network attack using object Petrinet[J].IEEE Transactions on Electrical and Electronic Engineering,2016,11(2):216-227.
[2]ZHAO W B.Research on the Network Security Monitoring System of Smart Water Conservancy Internet of Things[J].Water Resources Informatization,2021(4):39-46.
[3]LI Y J,ZHANG J,YANG X,et al.Discovery of Water Conservancy Network Security Threats Based on Situation Awareness [C]//Proceedings of the 2020(Eighth) China Water Conservancy Informatization Technology Forum.2020:328-334.
[4]RIGELSFORD J.Pattern recognition:Concepts,methods andapplications[J].Assembly Automation,2002,22(4).
[5]DONG W,WANG G,YAN Q,et al.Design of Network Security Situation Awareness and Early Warning System Based on Big Data[C]//2023 International Conference on Networking,Informatics and Computing(ICNETIC).Palermo,Italy,2023:749-753.
[6]CHANG L W,LIU X J,QIAN Y H,et al.A Network Security Situation Awareness Model Based on Multi-source Fusion of Convolutional Neural Networks [J].Computer Science,2023,50(5):382-389.
[7]XIE L X,WANG Y C,YU J B.Network Security SituationAwareness Based on Neural Networks [J].Journal of Tsinghua University(Science and Technology),2013,53(12):1750-1760.
[8]DUTT V,AHN Y S,GONZALEZ C.Cyber situation aware-ness:modeling detection of cyber attacks with instance-based learning theory[J].Human Factors,2013,55(3):605-618.
[9]HU J,MA D,LIU C,et al.Network Security Situation Prediction Based on MR-SVM[J].IEEE Access,2019,7:130937-130945.
[10]ALMEIDA R B,COVALSKI V,MACHADOR,et al.A hierarchical architectural model for network security exploring situational awareness[C]//Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.2019:1365-1372.
[11]SI C,ZHANG H,WANG Y,et al.Network Security Situation Elements Fusion Method Based on Ontology[C]//2014 Seventh International Symposium on Computational Intelligence and Design.Hangzhou,China,2014:272-275.
[12]JIA K,WANG L H,LIU D.Preliminary Exploration on theConstruction of the Network Security Situation Awareness System for the Hydrology of the Yangtze River [J].Express Water Resources & Hydropower Information,2021,42(3):79-84.
[13]CAO Q.System Design and Application of the Intelligent Operation Center for Large-scale Water Diversion Projects [J].Water Resources Informatization,2022,6(1):65-70.
[14]KONG Z J.Research on the Method and Application of Network Security Situation Awareness Based on D-S Evidence Theory [D].Hohhot:Inner Mongolia University,2022.
[15]LUO Q Q.Research on Network Security Situation Awareness Based on D-S Theory [D].Nanjing:Nanjing University of Posts and Telecommunications,2021.
[16]YANG H Y,ZENG R Y.A Network Security Situation Assessment Method Based on Deep Learning [J].Journal of Xidian University,2021,48(1):183-190.
[17]GOH J,ADEPU S,JUNEJO K N,et al.A Dataset to Support Research in the Design of Secure Water Treatment Systems[C]//The 11th International Conference on Critical Information Infrastructures Security.Cham:Springer,2016.
[18]Secure Water Treatment(SWaT) Testbed[EB/OL].https://itrust.sutd.edu.sg/itrust-labs_datasets/dataset_info/#swat.
[19]国务院.《国家突发公共事件总体应急预案》(http://www.gov.cn/jrzg/2006-01/08/content_150878.htm),2006.
[1] LIN Zheng, LIU Sicong, GUO Bin, DING Yasan, YU Zhiwen. Adaptive Operator Parallel Partitioning Method for Heterogeneous Embedded Chips in AIoT [J]. Computer Science, 2025, 52(2): 299-309.
[2] ZHU Fukun, TENG Zhen, SHAO Wenze, GE Qi, SUN Yubao. Semantic-guided Neural Network Critical Data Routing Path [J]. Computer Science, 2024, 51(9): 155-161.
[3] HAN Bing, DENG Lixiang, ZHENG Yi, REN Shuang. Survey of 3D Point Clouds Upsampling Methods [J]. Computer Science, 2024, 51(7): 167-196.
[4] XU Xiaohua, ZHOU Zhangbing, HU Zhongxu, LIN Shixun, YU Zhenjie. Lightweight Deep Neural Network Models for Edge Intelligence:A Survey [J]. Computer Science, 2024, 51(7): 257-271.
[5] LI Wenting, XIAO Rong, YANG Xiao. Improving Transferability of Adversarial Samples Through Laplacian Smoothing Gradient [J]. Computer Science, 2024, 51(6A): 230800025-6.
[6] CHEN Meng, QIAN Rongrong, ZHU Yujia, HUANG Zhenguo. Method of Outdoor CSI Feedback for Massive MIMO Systems Based on Deep Autoencoder [J]. Computer Science, 2024, 51(11A): 231000191-6.
[7] CHANG Liwei, LIU Xiujuan, QIAN Yuhua, GENG Haijun, LAI Yuping. Multi-source Fusion Network Security Situation Awareness Model Based on Convolutional Neural Network [J]. Computer Science, 2023, 50(5): 382-389.
[8] REN Shuyao, SONG Jiangling, ZHANG Rui. Early Screening Method for Depression Based on EEG Signal [J]. Computer Science, 2023, 50(11A): 221100139-6.
[9] QIAN Dong-wei, CUI Yang-guang, WEI Tong-quan. Secondary Modeling of Pollutant Concentration Prediction Based on Deep Neural Networks with Federal Learning [J]. Computer Science, 2022, 49(11A): 211200084-5.
[10] FAN Hong-jie, LI Xue-dong, YE Song-tao. Aided Disease Diagnosis Method for EMR Semantic Analysis [J]. Computer Science, 2022, 49(1): 153-158.
[11] ZHOU Xin, LIU Shuo-di, PAN Wei, CHEN Yuan-yuan. Vehicle Color Recognition in Natural Traffic Scene [J]. Computer Science, 2021, 48(6A): 15-20.
[12] XIAO Rui, JIANG Jia-qi, ZHANG Yun-chun. Study on Semantic Topology and Supervised Word Sense Disambiguation of Polysemous Words [J]. Computer Science, 2019, 46(11A): 13-18.
[13] HAN Jia-lin, WANG Qi-qi, YANG Guo-wei, CHEN Jun, WANG Yi-zhong. SSD Network Compression Fusing Weight and Filter Pruning [J]. Computer Science, 2019, 46(11): 272-276.
[14] LIU Jin-shuo and ZHANG Zhi. Sentiment Analysis on Food Safety News Using Joint Deep Neural Network Model [J]. Computer Science, 2016, 43(12): 277-280.
[15] SI Cheng, ZHANG Hong-qi, WANG Yong-wei and YANG Ying-jie. Research on Network Security Situational Elements Knowledge Base Model Based on Ontology [J]. Computer Science, 2015, 42(5): 173-177.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!